Search results for "computer.software_genre"

showing 10 items of 3858 documents

Exploring Multi-Objective Optimization for Multi-Label Classifier Ensembles

2019

Multi-label classification deals with the task of predicting multiple class labels for a given sample. Several performance metrics are designed in the literature to measure the quality of any multi-label classification technique. In general existing multi-label classification approaches focus on optimizing only a single performance measure. The current work builds on the hypothesis that a weighted ensemble of multiple multi-label classifiers will lead to obtain improved results. The appropriate weight combinations for combining the outputs of multiple classifiers can be selected after simultaneously optimizing different multi-label classification metrics like micro F1, hamming loss, 0/1 los…

Optimization problemLinear programmingbusiness.industryComputer science02 engineering and technologyMachine learningcomputer.software_genreMulti-objective optimizationComputingMethodologies_PATTERNRECOGNITION020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessClassifier (UML)computer2019 IEEE Congress on Evolutionary Computation (CEC)
researchProduct

Multi-party metering: An architecture for privacy-preserving profiling schemes

2013

Several privacy concerns about the massive deploy- ment of smart meters have been arisen recently. Namely, it has been shown that the fine-grained temporal traces generated by these meters can be correlated with different users behaviors. A new architecture, called multi-party metering, for enabling privacy-preserving analysis of high-frequency metering data without requiring additional complexity at the smart meter side is here proposed. The idea is to allow multiple entities to get a share of the high-frequency metering data rather than the real data, where this share does not reveal any information about the real data. By aggregating the shares provided by different users and publishing …

OptimizationInformation privacyEngineeringtatistical analysiSmart meterDistributed computingpattern clusteringC.2 COMPUTER-COMMUNICATION NETWORKSSmart gridelectricity supply industryComputer securitycomputer.software_genreCOMPUTER-COMMUNICATION NETWORKSElectricityClustering algorithmProfiling (information science)Metering modemart meterIndexeArchitectureCluster analysisgas industrydata privacybusiness.industrySettore ING-INF/03 - TelecomunicazioniComplexity theoryreal gas consumption dataVectorsA sharehigh-frequency metering datamultiparty meteringInformation sensitivityynthetic electricity consumption dataCryptographyprivacy-preserving profiling schemeprivacy-preserving analysibusinesscomputeruser profiling clustering mechanismMulti-Party Metering
researchProduct

Real-time pricing for aggregates energy resources in the Italian energy market

2015

Abstract Over the last decade, the architecture of the energy market has radically changed. In many countries end-users are now able to directly access the market, which has given rise to the question of how they can actively participate in that market. End-users can comprise a critical mass through aggregation that is carried out by a third party – to wit the “loads aggregator.” This paper proposes a new framework for generating feasible real-time price curves for those end-users in a demand-response management process. The underlying algorithm generates output curves as the solution to a constrained optimization problem whose objective function is the aggregator's economic benefit. A case…

OptimizationReal time pricingThird partyMechanical EngineeringEnergy resourcesReal time pricingBuilding and Constructioncomputer.software_genrePollutionIndustrial and Manufacturing EngineeringNews aggregatorMicroeconomicsCritical mass (sociodynamics)Settore ING-IND/33 - Sistemi Elettrici Per L'EnergiaGeneral EnergyCommerceEconomicsEnergy marketElectrical and Electronic EngineeringArchitecturecomputerManagement processLoads aggregationCivil and Structural Engineering
researchProduct

Virtual Resource Allocation for Wireless Virtualized Heterogeneous Network with Hybrid Energy Supply

2022

In this work, two novel virtual user association and resource allocation algorithms are introduced for a wireless virtualized heterogeneous network with hybrid energy supply. In the considered system, macro base stations (MBSs) are supplied by the grid power and small base stations (SBSs) have the energy harvesting capability in addition to the grid power supplement. Multiple infrastructure providers (InPs) own the physical resources, i.e., BSs and radio resources. The Mobile Virtual Network Operators (MVNOs) are able to recent these resources from the InPs and operate the virtualized resources for providing services to different users. In particular, aiming to maximize the overall utility …

Optimizationenergy harvestingreinforcement learningvirtualisointiComputer scienceDistributed computingresource allocationsyväoppiminenwireless network virtualizationresursointicomputer.software_genreIndium phosphideenergian kerääminenIII-V semiconductor materialsBase stationVirtualizationHybrid power systemsWirelessResource managementElectrical and Electronic EngineeringWireless networksbusiness.industryWireless networkApplied MathematicsResource managementdeep learningVirtualizationGridComputer Science ApplicationskoneoppiminenResource allocationbusinessADMMcomputerHeterogeneous networklangattomat verkot
researchProduct

Comparing Boosting and Bagging for Decision Trees of Rankings

2021

AbstractDecision tree learning is among the most popular and most traditional families of machine learning algorithms. While these techniques excel in being quite intuitive and interpretable, they also suffer from instability: small perturbations in the training data may result in big changes in the predictions. The so-called ensemble methods combine the output of multiple trees, which makes the decision more reliable and stable. They have been primarily applied to numeric prediction problems and to classification tasks. In the last years, some attempts to extend the ensemble methods to ordinal data can be found in the literature, but no concrete methodology has been provided for preference…

Ordinal dataBoosting (machine learning)Preference learningEnsemble methodsComputer sciencebusiness.industryDecision tree learningDecision treesDecision treeLibrary and Information SciencesMachine learningcomputer.software_genreEnsemble learningBoostingMathematics (miscellaneous)RankingPattern recognition (psychology)Psychology (miscellaneous)Artificial intelligencePreference learningStatistics Probability and UncertaintybusinesscomputerRankings
researchProduct

Testing for non-linearity in an artificial financial market: a recurrence quantification approach

2004

Abstract In this paper, earlier work on testing for non-linear dynamics on realizations from an artificial financial market is extended in two ways. On the one hand, Hinich’s bispectral test and White’s neural network test are computed. On the other hand, a recently developed methodology to test for hidden structures in data, inherited from Physics, is successfully applied on the realizations of the artificial market. Results among alternative tests are compared.

Organizational Behavior and Human Resource ManagementEconomics and EconometricsActuarial scienceArtificial neural networkbusiness.industryFinancial marketNon linearityMachine learningcomputer.software_genreArtificial marketTest (assessment)Nonlinear systemEconomicsArtificial intelligencebusinesscomputerJournal of Economic Behavior & Organization
researchProduct

Correlation, hierarchies, and networks in financial markets

2010

We discuss some methods to quantitatively investigate the properties of correlation matrices. Correlation matrices play an important role in portfolio optimization and in several other quantitative descriptions of asset price dynamics in financial markets. Specifically, we discuss how to define and obtain hierarchical trees, correlation based trees and networks from a correlation matrix. The hierarchical clustering and other procedures performed on the correlation matrix to detect statistically reliable aspects of the correlation matrix are seen as filtering procedures of the correlation matrix. We also discuss a method to associate a hierarchically nested factor model to a hierarchical tre…

Organizational Behavior and Human Resource ManagementEconomics and EconometricsPhysics - Physics and SocietyCorrelation based networkKullback–Leibler divergenceStability (learning theory)FOS: Physical sciencesKullback–Leibler distancePhysics and Society (physics.soc-ph)computer.software_genreHierarchical clusteringFOS: Economics and businessCorrelationMultivariate analysis Hierarchical clustering Correlation based networks Bootstrap validation Factor models Kullback–Leibler distancePortfolio Management (q-fin.PM)Bootstrap validationQuantitative Finance - Portfolio ManagementMathematicsFactor analysisStatistical Finance (q-fin.ST)Covariance matrixMultivariate analysiQuantitative Finance - Statistical FinanceHierarchical clusteringFactor modelTree (data structure)Physics - Data Analysis Statistics and ProbabilityData miningPortfolio optimizationcomputerData Analysis Statistics and Probability (physics.data-an)
researchProduct

The concept of genre within the critical approach to information systems development

2001

Abstract Jurgen Habermas' Critical Social Theory is regarded as a potential approach to information systems development (hereinafter referred to as the critical approach). However, the theoretical promise of this approach has not yet been operationalized in practice. This paper discusses the potential of the genre theory of organizational communication as a conceptual basis for doing so, using two studies that applied genre concepts to analyses and debates on document management. In particular, the paper illustrates the capability of genre concepts in responding to pleas for three types of rationality — communicative, emancipatory, and formal — considered fundamental to any method of inform…

Organizational Behavior and Human Resource ManagementOperationalizationRationalityDocument management systemLibrary and Information Sciencescomputer.software_genreStructuringLinguisticsManagement Information SystemsEpistemologyDevelopment (topology)Critical theoryManagement of Technology and InnovationInformation systemOrganizational communicationSociologycomputerInformation SystemsInformation and Organization
researchProduct

Sensitivity Analysis Of Key Customers And Revenue-Oriented Admission Control And Scheduling Algorithm

2013

Received: 15 January 2013 Abstract Accepted: 2 February 2013 The paper deals with the problem of Quality of Web Service (QoWS) in e-commerce Web servers, i.e. in retail Web stores. It concerns the admission control and scheduling algorithm for a Web server system, which aims at preventing the system from overload to provide high QoWS level and ultimately, to increase Web site’s conversion rate, i.e. to turn more visitors into customers. The sensitivity of the algorithm to changes in its basic parameter values was analyzed by using a simulation-based approach. Special attention was paid to evaluation of the parameter impact on conventional and business-related system performance metrics.

Organizational Behavior and Human Resource ManagementWeb serverDatabasebusiness.industryComputer sciencemedia_common.quotation_subjectE-commerceAdmission controlManagement Science and Operations Researchcomputer.software_genreIndustrial and Manufacturing EngineeringManagement of Technology and InnovationKey (cryptography)RevenueQuality (business)Sensitivity (control systems)Business and International ManagementWeb servicebusinesscomputermedia_commonManagement and Production Engineering Review
researchProduct

Conceptual Characterization of Cybersecurity Ontologies

2020

Part 7:Risk and Security Modeling; International audience; Cybersecurity is known as the practice of protecting systems from digital attacks. Organizations are seeking efficient solutions for the management and protection of their assets. It is a complex issue, especially for great enterprises, because it requires an interdisciplinary approach. The kinds of problems enterprises must deal with and this domain complexity induces misinterpretations and misunderstandings about the concepts and relations in question. This article focus on dealing with Cybersecurity from an ontological perspective. The first contribution is a search of previously existing works that have defined Cybersecurity Ont…

OrganizationsCybersecurityOntologyProcess (engineering)Computer scienceEnterprise architectureEnterprise architecture02 engineering and technologyCharacterization (mathematics)Ontology (information science)021001 nanoscience & nanotechnologycomputer.software_genreComputer securityOntology engineeringField (computer science)Focus (linguistics)Domain (software engineering)Knowledge graphs0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]020201 artificial intelligence & image processing0210 nano-technologyLENGUAJES Y SISTEMAS INFORMATICOScomputer
researchProduct